| /mbedtls/library/ |
| A D | ecdh.c | 420 mbedtls_ecdh_side side) in ecdh_get_params_internal() argument 425 if (side == MBEDTLS_ECDH_THEIRS) { in ecdh_get_params_internal() 430 if (side != MBEDTLS_ECDH_OURS) { in ecdh_get_params_internal() 447 mbedtls_ecdh_side side) in mbedtls_ecdh_get_params() argument 450 if (side != MBEDTLS_ECDH_OURS && side != MBEDTLS_ECDH_THEIRS) { in mbedtls_ecdh_get_params() 470 return ecdh_get_params_internal(ctx, key, side); in mbedtls_ecdh_get_params() 476 mbedtls_everest_ecdh_side s = side == MBEDTLS_ECDH_OURS ? in mbedtls_ecdh_get_params() 485 key, side); in mbedtls_ecdh_get_params()
|
| /mbedtls/3rdparty/everest/library/ |
| A D | everest.c | 67 mbedtls_everest_ecdh_side side ) in mbedtls_everest_get_params() argument 70 mbedtls_x25519_ecdh_side s = side == MBEDTLS_EVEREST_ECDH_OURS ? in mbedtls_everest_get_params()
|
| A D | x25519.c | 105 mbedtls_x25519_ecdh_side side ) in mbedtls_x25519_get_params() argument 109 switch( side ) { in mbedtls_x25519_get_params()
|
| /mbedtls/3rdparty/everest/include/everest/ |
| A D | x25519.h | 121 mbedtls_x25519_ecdh_side side );
|
| A D | everest.h | 157 mbedtls_everest_ecdh_side side );
|
| /mbedtls/ |
| A D | SECURITY.md | 68 physical side channels as well. Remote and physical timing attacks are covered 75 #### Local non-timing side channels 83 side channel attacks. If local non-timing attacks are present in a use case or
|
| A D | ChangeLog | 266 * Fix a timing side channel in private key RSA operations. This side channel 316 the capabilities of the PSA side for either key. 680 * Fix a potential heap buffer overread in TLS 1.3 client-side when 2346 * Fix side channel in mbedtls_ecp_check_pub_priv() and 2640 side of the key exchange had a similar bug. 3130 * Close a test gap in (D)TLS between the client side and the server side: 3132 in the same way as on the server side. 4775 * Add server-side enforcement of sent renegotiation requests 5053 * Server-side initiated renegotiations send HelloRequest 5476 * Added ServerName extension parsing (SNI) at server side [all …]
|
| /mbedtls/docs/architecture/ |
| A D | tls13-support.md | 15 - Mbed TLS implements both the client and the server side of the TLS 1.3 81 - TLS 1.2 and TLS 1.3 with version negotiation on client and server side. 354 client side, the states related to certificate parsing and validation are 361 client side is a example of that. 381 will be, an example of that on client side being if we are going to receive a 432 outbound message on server side as well.
|
| A D | psa-shared-memory.md | 111 …GlobalPlatform TEE Trusted Application (application running on the secure side of TrustZone on Cor… 198 …TLS, a [known issue](https://github.com/Mbed-TLS/mbedtls/issues/3266)). A side benefit of doing th…
|
| /mbedtls/tests/ |
| A D | Descriptions.txt | 16 For each ciphersuite/version/side/authmode it performs a full handshake
|
| /mbedtls/include/mbedtls/ |
| A D | ecdh.h | 345 mbedtls_ecdh_side side);
|
| /mbedtls/docs/architecture/psa-migration/ |
| A D | psa-limitations.md | 71 3. Variant of the precedent: only drop client-side support. Server-side is 77 when moving to PSA. Server-side would work as above; unfortunately 78 client-side the only option is to offer named groups and break the handshake
|
| A D | testing.md | 54 (We should have the same server-side.)
|
| A D | psa-legacy-bridges.md | 141 …On the legacy side, this is an `mbedtls_pk_type_t` value and more. For ECDSA, the choice between r… 143 …On the PSA side, this is a `psa_key_type_t` value and an algorithm which is normally encoded as po…
|
| A D | md-cipher-dispatch.md | 267 … the keystore, and plausibly a cipher accelerator might want entropy (for side channel countermeas…
|
| /mbedtls/tests/suites/ |
| A D | test_suite_dhm.function | 145 /* The domain parameters must be the same on both side. */
|
| A D | test_suite_ssl.function | 435 * of at least one byte on either side. */ 3304 /* Client side, force SECP256R1 to make one key bitflip fail 3313 /* Server side */ 4680 * initiate the handshake on server side before doing all the calls to 4729 * Now, check data on server side. It is not done in the previous loop as 4890 * can be sent from client side. Then send in a loop as much early data as 4924 * expansion) of early data on server side and the number of early data
|
| A D | test_suite_ecp.function | 160 * but for the sake of simplicity only does half of each side. It's
|
| /mbedtls/docs/ |
| A D | use-psa-crypto.md | 139 is enabled, no change required on the application side.
|
| A D | driver-only-builds.md | 128 `MBEDTLS_DETERMINISTIC_ECDSA` on the legacy side and 431 - AES is supported on the PSA side together with ECB mode, i.e.
|
| A D | psa-transition.md | 258 The PSA API does not have an equivalent to the timing-side-channel-resistance utility functions in … 554 …ed value. Note that this comparison should be in constant time to avoid a side channel vulnerabili… 562 …ed value. Note that this comparison should be in constant time to avoid a side channel vulnerabili… 1151 …SA version of this workflow can also be used with other protocols, on the side of the party that s… 1176 …SA version of this workflow can also be used with other protocols, on the side of the party that r… 1201 * With either side, accessing the group: call [`psa_get_key_attributes`](https://mbed-tls.readthedo…
|
| A D | 3.0-migration-guide.md | 505 side-channel attacks.
|
| /mbedtls/programs/ |
| A D | README.md | 89 In addition to providing options for testing client-side features, the `ssl_client2` program has op…
|
| /mbedtls/docs/architecture/psa-thread-safety/ |
| A D | psa-thread-safety.md | 121 …ent-calling-conventions)), operations in progress can have memory related side effects. It is poss… 247 …`psa_get_and_lock_key_slot`. All other steps have no non resource-related side effects (except for…
|
| /mbedtls/docs/architecture/testing/ |
| A D | invasive-testing.md | 69 …` function that does nothing (not a macro, to avoid accidentally skipping side effects in its para…
|